>Indeed. The whole concept is fatally flawed; probably the biggest
>challenge facing a cracker attacking this system is choosing which of the
>many avenues to start with :-)
>
>1. The drivers. I really like displaying audio and video via my hard
>drive, so I use drivers which do that...
Or you
On Tue, 13 Mar 2001, Thomas Dodd wrote:
> Andre Hedrick wrote:
> > >From siliconvalley.com's GMSV column today:
> >self-destruct if it's tampered with. The utility is enabled
> >with 11 layers of security defenses, all of which must be
> >successfully navigated to disable the
Andre Hedrick wrote:
> >From siliconvalley.com's GMSV column today:
>self-destruct if it's tampered with. The utility is enabled
>with 11 layers of security defenses, all of which must be
>successfully navigated to disable the system. These layers
>range from a series of forced
>From siliconvalley.com's GMSV column today:
No one expects the Spanish Inquisition, "the white screen of
death"" A small Texas venture with roots in the intelligence
community has developed a digital copy protection scheme that
it says is nearly unbeatable. Infraworks' InTether
From siliconvalley.com's GMSV column today:
No one expects the Spanish Inquisition, "the white screen of
death"" A small Texas venture with roots in the intelligence
community has developed a digital copy protection scheme that
it says is nearly unbeatable. Infraworks' InTether
Andre Hedrick wrote:
From siliconvalley.com's GMSV column today:
self-destruct if it's tampered with. The utility is enabled
with 11 layers of security defenses, all of which must be
successfully navigated to disable the system. These layers
range from a series of forced
On Tue, 13 Mar 2001, Thomas Dodd wrote:
Andre Hedrick wrote:
From siliconvalley.com's GMSV column today:
self-destruct if it's tampered with. The utility is enabled
with 11 layers of security defenses, all of which must be
successfully navigated to disable the system. These
Indeed. The whole concept is fatally flawed; probably the biggest
challenge facing a cracker attacking this system is choosing which of the
many avenues to start with :-)
1. The drivers. I really like displaying audio and video via my hard
drive, so I use drivers which do that...
Or you could
8 matches
Mail list logo